?? Job Interview Scam Alert: TensorFlow Developer Certification Scam ??
Dinesh Kumar
Swotting AI, Offensive Security, CISSP | Cyber Threat Researcher | Threat Hunting, Malware Analysis, Cybercrime Investigation, Former Product Manager at Yahoo! | Cyber Aware #WeDoHack #d9hunt #d09r
The job market is evolving, and so are the tactics of scammers. One of the latest schemes preys on job seekers, especially those aiming for roles in the tech industry. The scammers exploit the reputation of TensorFlow, a widely used machine learning framework, to trick applicants into paying for fraudulent certifications.
How the Job Interview Scam and Certification Scam Works
Fake websites designed to impersonate TensorFlow.
?? tensorflow-training.org
?? tensorflow.training
Fake websites designed to impersonate PhonePe are being used to deceive and exploit unsuspecting job seekers.
?? phonepe-group.com
?? phonepe.technology
?? phonepe.training
?? phonepe.education
?? phonepe.email
?? phonepe.ventures
?? phonepe.org.in
?? phonepe.club
?? phonepe.gold
?? phonepe.us
?? phonepe-dr.com
?? phonepe.click
?? phonepe.ing
?? phonepe-scratch-and-win.in
?? phonepe.cards
?? phonepe.direct
?? phonepe.international
?? phonepe.land
?? phonepe.systems
These fake websites are not affiliated with TensorFlow or PhonePe and are designed to steal your money and/or personal information.
Fake PhonePe Job Interviews
The Scammer listed fake job listings on LinkedIn and asked interested candidates to share emails in the "comments" and "like" the posts. Followed by, reaching out to potential victims via email (from: [email protected]) to schedule fake online written exams and video call interview in 谷歌 Meet, followed by sending fake offer letters of PhonePe and stating that the hiring manager feels the candidate lacks certain "mandatory skills" for the role. To "secure the job", they instruct candidates to obtain a TensorFlow certification via scam websites which are crafted as "too good to be true" to make a payment of ?22999 or USD270.73 for bogus TensorFlow training and certifications.
Platforms Abused
In this scam incident, scammers utilized multiple genuine platforms to make the "victim" unsuspected and hide their scam network origins or unsuspected over the entire scam activities from the initial "leads" to the end "conversions" ("make money").
Selar , Gumroad - Selar & Gumroad were used to facilitate the e-commerce store and payment gateway to receive payments
Zoho - Zoho forms used to collect "personal identity information" such as name, email id, phone number, Passport, PAN card, and Aadhaar card of "victims".
tawk.to - Tawk was used for "live chat support", facilitating and ensuring that conversion happens if the victim are unable to make payment via credit/debit cards and using "UPI Payment" as a fallback.
cPanel - cPanel for hosting
?? selar.co/316f86
?? 980872767129.gumroad.com
?? forms.zohopublic.in/leazedutechopcpvtltd/[REDACTED]
?? tawk.to/[REDACTED]propertyId=671b92ed2480f5b4f593ba69&[REDACTED]
领英推荐
Why This Matters
Such scams not only cause financial losses but also waste time and damage the confidence of genuine job seekers especially recently graduated students who are primary targets here. It’s crucial to remain vigilant and informed to avoid falling victim to such traps.
?? Tips to Stay Safe
What You Can Do
Let’s work together to make the job market safer for everyone, especially recently graduated students who are primary "targets" by these scammers. Protect yourself and empower your peers with knowledge.
?? Official TensorFlow Certification Information: https://www.tensorflow.org
?? Official PhonePe Website: https://www.phonepe.com
?? Official TensorFlow LinkedIn Page: https://www.dhirubhai.net/showcase/tensorflowdev
?? Official PhonePe Job Listing LinkedIn Page: https://www.dhirubhai.net/company/phonepe-internet/jobs
#Scam #Fraud #OnlineFraud #JobScam #ScamAlert #CyberSafety #Cybercrime #TensorFlow #MachineLearning #JobHunt #CareerSafety #PhonePe #CareerTips
Stay safe, stay informed, and help others do the same! ??
D09r #WeDoHack
Swotting AI, Offensive Security, CISSP | Cyber Threat Researcher | Threat Hunting, Malware Analysis, Cybercrime Investigation, Former Product Manager at Yahoo! | Cyber Aware #WeDoHack #d9hunt #d09r
1 个月This scammer's bank details: BharatPe UPI: beenaanthony@bpunity Jio Payments Bank Acc: 000921711228776 Beneficiary Name: Beena Anthony Scammer abused Jio Payments Bank Ltd. & BharatPe platforms to facilitate the payment in this job scam. #ScamAlert #OnlineFraud
DevOps | Cloud | ML Engineer | Data Analyst | Backend Developer
2 个月Thanks for sharing. ? The same thing happened for me today. You have helped me to get out of this scam!